Login
Newsletter
Werbung

Sicherheit: Denial of Service in openssl
Aktuelle Meldungen Distributionen
Name: Denial of Service in openssl
ID: SSA:2008-210-08
Distribution: Slackware
Plattformen: Slackware -current, Slackware 11.0, Slackware 12.0, Slackware 12.1
Datum: Di, 29. Juli 2008, 07:54
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0891
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1672
Applikationen: OpenSSL

Originalnachricht


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] openssl (SSA:2008-210-08)

New openssl packages are available for Slackware 11.0, 12.0, 12.1, and -current
to fix security issues.

More details about this issues may be found in the Common
Vulnerabilities and Exposures (CVE) database:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0891
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1672

Upgraded OpenSSH packages have been provided to make sure that ssh is not
broken my the update -- especially if your machine is a remote one, be SURE
to upgrade to the new openssh package as well!


Here are the details from the Slackware 12.1 ChangeLog:
+--------------------------+
patches/packages/openssl-0.9.8h-i486-1_slack12.1.tgz:
Upgraded to OpenSSL 0.9.8h.
The Codenomicon TLS test suite uncovered security bugs in OpenSSL.
If OpenSSL was compiled using non-default options (Slackware's package
is not), then a malicious packet could cause a crash. Also, a malformed
TLS handshake could also lead to a crash.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0891
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1672
When upgrading OpenSSL, it is VERY IMPORTANT to also upgrade OpenSSH, or
it is possible to be unable to log back into sshd!
(* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

HINT: Getting slow download speeds from ftp.slackware.com?
Give slackware.osuosl.org a try. This is another primary FTP site
for Slackware that can be considerably faster than downloading
directly from ftp.slackware.com.

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating additional FTP and rsync hosting
to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated packages for Slackware 11.0:
openssl-solibs-0.9.8h-i486-1_slack11.0.tgz
openssl-0.9.8h-i486-1_slack11.0.tgz
openssh-5.1p1-i486-1_slack11.0.tgz

Updated packages for Slackware 12.0:
openssl-solibs-0.9.8h-i486-1_slack12.0.tgz
openssl-0.9.8h-i486-1_slack12.0.tgz
openssh-5.1p1-i486-1_slack12.0.tgz

Updated packages for Slackware 12.1:
openssl-solibs-0.9.8h-i486-1_slack12.1.tgz
openssl-0.9.8h-i486-1_slack12.1.tgz
openssh-5.1p1-i486-1_slack12.1.tgz

Updated packages for Slackware -current:
openssl-solibs-0.9.8h-i486-1.tgz
openssl-0.9.8h-i486-1.tgz
openssh-5.1p1-i486-1.tgz


MD5 signatures:
+-------------+

Slackware 11.0 packages:
8ee9a3b3366a29a84b7314fb40a7c808 openssl-0.9.8h-i486-1_slack11.0.tgz
863b5deeffd7eb58ef41b1b49759bff5 openssl-solibs-0.9.8h-i486-1_slack11.0.tgz
617456c059e8d7761de7e3c92ee5e473 openssh-5.1p1-i486-1_slack11.0.tgz

Slackware 12.0 packages:
ae721f8dd900c930d6c2e27581f577a9 openssl-0.9.8h-i486-1_slack12.0.tgz
30271692b6253c5dc733c80a986d13d1 openssl-solibs-0.9.8h-i486-1_slack12.0.tgz
5fd2eae44bf0d311bdfebb930790ab88 openssh-5.1p1-i486-1_slack12.0.tgz

Slackware 12.1 packages:
cb3674edf80bfabe23a1901f9eecea09 openssl-0.9.8h-i486-1_slack12.1.tgz
dc0df15982723244c920417d5fa9c15a openssl-solibs-0.9.8h-i486-1_slack12.1.tgz
0684a119d56721053e1f57b06692642d openssh-5.1p1-i486-1_slack12.1.tgz

Slackware -current packages:
b72f7a417b524f06f8443ea9a13b58ca openssl-0.9.8h-i486-1.tgz
fa6658aabc7ab02736a01e511b9cc9ec openssl-solibs-0.9.8h-i486-1.tgz
97d4828d0b5d88b16d83d7265a54f9de openssh-5.1p1-i486-1.tgz


Installation instructions:
+------------------------+

Upgrade the packages as root:
# upgradepkg openssl-0.9.8h-i486-1_slack12.1.tgz
openssl-solibs-0.9.8h-i486-1_slack12.1.tgz openssh-5.1p1-i486-1_slack12.1.tgz

Then, restart sshd if you use it:
sh /etc/rc.d/rc.sshd restart


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkiOneoACgkQakRjwEAQIjPX1wCfZwdQKlNgIq4EwORqMsf0xxwx
Yv0AniWkViglVZkSO7cIii+7Zs/9/I+d
=9HCI
-----END PGP SIGNATURE-----
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung